This section contains more frequently asked Data integrity and Security Multiple Choice Questions Answers in the various competitive exams.
1. Which of the following are direct harms caused by spam?
- Loss of productivity
- Increased staff costs
- Increased infrastructure costs
- Increased downloading costs
- All of the above
2. Which of the following is the Hashing Algorithm?
- AES
- 3-DES
- DES
- MD5
3. Which key is used to decrypt the message in PKI?
- Public Key.
- Private Key.
- Pre-shared Secret Key.
- Hybrid Key.
4. What is Joe Job?
- A virus
- An antivirus
- A spam attack
- An antispam
5. Which of the following are Email Security Protocols?
- S/MIME
- PEM
- STE
- PME
6. Which of the following symmetric algorithms have variable key length?
- AES
- Triple DES
- IDEA
- Rivest Cipher 4
7. What is Mail Exchanger(MX) Record?
- Router route.
- Record in router.
- Record in DNS specifying the internet email route.
- Record in DHCP specifying the email route
8. Which of the following measures should be taken to tackle spam mails?
- Blocking and accepting on the basis of MTA IP address
- Limiting the number of outgoing e-mails per account
- Authentication mechanisms
- Spam filtering.
- All of the above
9. Which of the following are different categories of viruses?
- Parasitic
- Bootstrap sector
- Companion
- All of the above
10. What is the function of the Reverse DNS Look up Technique in identifying spam mails?
- To check the sender's email server attempting for spoofing
- To check the receiver's email server attempting for spoofing
- To check the DNS server validity
- None of these